{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:05:20.286","vulnerabilities":[{"cve":{"id":"CVE-2024-27930","sourceIdentifier":"security-advisories@github.com","published":"2024-03-18T16:15:08.453","lastModified":"2025-01-02T16:19:42.813","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can access sensitive fields data from items on which he has read access. This issue has been patched in version 10.0.13."},{"lang":"es","value":"GLPI es un paquete gratuito de software de gestión de TI y activos, gestión de centros de datos, ITIL Service Desk, seguimiento de licencias y auditoría de software. Un usuario autenticado puede acceder a datos de campos confidenciales de elementos sobre los que tiene acceso de lectura. Este problema se solucionó en la versión 10.0.13."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionStartIncluding":"0.78","versionEndExcluding":"10.0.13","matchCriteriaId":"B1C90DAD-A342-4981-BE0A-2ECB46B6410C"}]}]}],"references":[{"url":"https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html","source":"security-advisories@github.com","tags":["Exploit"]},{"url":"https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/glpi-project/glpi/releases/tag/10.0.13","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/glpi-project/glpi/releases/tag/10.0.13","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}